Pluralsight - Tactical Design Patterns in .NET - Managing Responsibilities
大小
875.59 MB
文件数
55
Info Hash:
1D326274AA96E72EE539D46BE306D0FA88524B62
收录时间
2025-12-19 06:52:48
更新时间
2025-12-19 09:07:14
文件列表 (55)
01 The Right Time to Apply a Design Pattern/01 01 Introduction.mp4
17.6 MB
01 The Right Time to Apply a Design Pattern/01 02 Implementing the Observer.mp4
14.84 MB
01 The Right Time to Apply a Design Pattern/01 03 Supporting Different Notifications.mp4
21.04 MB
01 The Right Time to Apply a Design Pattern/01 04 Evolving the Observer.mp4
44.33 MB
01 The Right Time to Apply a Design Pattern/01 05 Design Patterns Backed by .NET Framework.mp4
14.91 MB
01 The Right Time to Apply a Design Pattern/01 06 When Is the Right Time to Apply a Design Pattern.mp4
17.64 MB
01 The Right Time to Apply a Design Pattern/01 07 Summary.mp4
4.81 MB
02 Cascading Factories to Eliminate Dependencies/02 01 Vacation Builder Example.mp4
23.13 MB
02 Cascading Factories to Eliminate Dependencies/02 02 Pulling the Abstract Factory Out.mp4
29.6 MB
02 Cascading Factories to Eliminate Dependencies/02 03 Using Inversion of Control to Resolve Dependencies.mp4
10.73 MB
02 Cascading Factories to Eliminate Dependencies/02 04 Cascading Factories Explained.mp4
12.53 MB
02 Cascading Factories to Eliminate Dependencies/02 05 Abstract and Concrete Factories.mp4
6.48 MB
02 Cascading Factories to Eliminate Dependencies/02 06 Summary.mp4
3.68 MB
03 Real World Composition Pitfalls/03 01 Introduction to Composite Design Pattern.mp4
8.67 MB
03 Real World Composition Pitfalls/03 02 Evolving the Graphic Elements Example.mp4
23.94 MB
03 Real World Composition Pitfalls/03 03 Discussing the Detailed Model.mp4
10.09 MB
03 Real World Composition Pitfalls/03 04 Abstraction vs. Implementation.mp4
8.6 MB
03 Real World Composition Pitfalls/03 05 Summary.mp4
8.97 MB
04 Compositing the Control Role/04 01 Approaching the Problem.mp4
17.32 MB
04 Compositing the Control Role/04 02 Refactoring the Initial Solution.mp4
24.95 MB
04 Compositing the Control Role/04 03 Simplifying the Composite Element.mp4
14.43 MB
04 Compositing the Control Role/04 04 Capitalizing on the Refactoring.mp4
25.76 MB
04 Compositing the Control Role/04 05 Revisiting the Evolution of Composite.mp4
7.91 MB
04 Compositing the Control Role/04 06 Command-query Separation and Composite.mp4
9.84 MB
04 Compositing the Control Role/04 07 Summary.mp4
5.16 MB
05 Object Composition Using Chain of Responsibility/05 01 Introducing Chain of Responsibility.mp4
8.28 MB
05 Object Composition Using Chain of Responsibility/05 02 Problem Statement.mp4
12.1 MB
05 Object Composition Using Chain of Responsibility/05 03 Initial Solution.mp4
21.67 MB
05 Object Composition Using Chain of Responsibility/05 04 Object Composition Instead of Class Inheritance.mp4
11.29 MB
05 Object Composition Using Chain of Responsibility/05 05 Implementing the Object Composition.mp4
12.07 MB
05 Object Composition Using Chain of Responsibility/05 06 Applying Chain of Responsibility.mp4
35 MB
05 Object Composition Using Chain of Responsibility/05 07 Chain of Responsibility Class Diagram.mp4
4.37 MB
05 Object Composition Using Chain of Responsibility/05 08 Compositing Objects at Run Time.mp4
15.16 MB
05 Object Composition Using Chain of Responsibility/05 09 Summary.mp4
3.16 MB
06 Visitor Design Pattern and Encapsulation/06 01 Introduction to Visitor Design Pattern.mp4
12.52 MB
06 Visitor Design Pattern and Encapsulation/06 02 Before the Visitor.mp4
18.3 MB
06 Visitor Design Pattern and Encapsulation/06 03 Encapsulating the Model Data.mp4
17.32 MB
06 Visitor Design Pattern and Encapsulation/06 04 The Usual Way of the Visitor.mp4
26.61 MB
06 Visitor Design Pattern and Encapsulation/06 05 Preserving Encapsulation in the Visited Object.mp4
19.53 MB
06 Visitor Design Pattern and Encapsulation/06 06 Preserving Encapsulation of Elements.mp4
16.35 MB
06 Visitor Design Pattern and Encapsulation/06 07 Summary.mp4
6.32 MB
07 Calling Protocols and the Visitor/07 01 A Word About Information Hiding.mp4
13.4 MB
07 Calling Protocols and the Visitor/07 02 Calling Protocol on the Accept Method.mp4
15.35 MB
07 Calling Protocols and the Visitor/07 03 Commanding Visitors vs. Querying Visitors.mp4
17.92 MB
07 Calling Protocols and the Visitor/07 04 Implementing the Command Visitor.mp4
36.44 MB
07 Calling Protocols and the Visitor/07 05 Accept Method as Coordinator.mp4
24.25 MB
07 Calling Protocols and the Visitor/07 06 Summary.mp4
6.08 MB
08 Using Mixin to Move Responsibilities Out/08 01 Introducing Mixins.mp4
16.93 MB
08 Using Mixin to Move Responsibilities Out/08 02 Basic Example.mp4
19.94 MB
08 Using Mixin to Move Responsibilities Out/08 03 Moving Responsibility to the Mixin.mp4
30.91 MB
08 Using Mixin to Move Responsibilities Out/08 04 Mixin with Abstract Factories.mp4
8.85 MB
08 Using Mixin to Move Responsibilities Out/08 05 Mixing Responsibilities into Unrelated Classes.mp4
23.15 MB
08 Using Mixin to Move Responsibilities Out/08 06 Polymorphic Behavior of Mixins.mp4
12.83 MB
08 Using Mixin to Move Responsibilities Out/08 07 Summary.mp4
17.28 MB
Exercise Files.zip
5.26 MB